23
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Bi-Level Intrusion Detection in IoT Networks Using Ensemble Method and A-GRU-RNN Classifier

ORCID Icon &
Received 10 Oct 2023, Accepted 14 Nov 2023, Published online: 11 Apr 2024

References

  • H. Al-Hamadi, I. R. Chen, D. C. Wang, and M. Almashan, “Attack and defense strategies for intrusion detection in autonomous distributed IoT systems,” IEEE Access., vol. 8, pp. 168994–169009, 2020. DOI: 10.1109/ACCESS.2020.3023616.
  • A. Yahyaoui, T. Abdellatif, S. Yangui, and R. Attia, “READ-IoT: reliable event and anomaly detection framework for the internet of things,” IEEE Access., vol. 9, pp. 24168–24186, 2021. DOI: 10.1109/ACCESS.2021.3056149.
  • H. H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, and K. K. R. Choo, “A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks,” IEEE Trans. Emerg. Top. Comput., vol. 7, no. 2, pp. 314–323, 2019. DOI: 10.1109/TETC.2016.2633228.
  • S. M. Kasongo, “An advanced intrusion detection system for IIoT Based on GA and tree based algorithms,” IEEE Access., vol. 9, pp. 113199–113212, 2021. DOI: 10.1109/ACCESS.2021.3104113.
  • J. Li, Z. Zhao, R. Li, and H. Zhang, “AI-based two-stage intrusion detection for software defined IoT networks,” IEEE Internet Things J., vol. 6, no. 2, pp. 2093–2102, 2019. DOI: 10.1109/JIOT.2018.2883344.
  • P. Nimbalkar and D. Kshirsagar, “Feature selection for intrusion detection system in Internet-of-Things (IoT),” ICT Express., vol. 7, no. 2, pp. 177–181, 2021. DOI: 10.1016/j.icte.2021.04.012.
  • D. J. Atul, R. Kamalraj, G. Ramesh, K. Sakthidasan Sankaran, S. Sharma, and S. Khasim, “A machine learning based IoT for providing an intrusion detection system for security,” Microprocess. Microsyst., vol. 82, pp. 103741, 2021. DOI: 10.1016/j.micpro.2020.103741.
  • M. Ge, N. F. Syed, X. Fu, Z. Baig, and A. Robles-Kelly, “Towards a deep learning-driven intrusion detection approach for Internet of Things,” Comput. Netw., vol. 186, pp. 107784, 2021. DOI: 10.1016/j.comnet.2020.107784.
  • F. Medjek, D. Tandjaoui, N. Djedjig, and I. Romdhani, “Fault-tolerant AI-driven intrusion detection system for the internet of things,” Int. J. Crit. Infrastruct. Protect., vol. 34, pp. 100436, 2021. DOI: 10.1016/j.ijcip.2021.100436.
  • A. Alhowaide, I. Alsmadi, and J. Tang, “Ensemble detection model for IoT IDS,” Internet Things (Netherlands), vol. 16, pp. 100435, 2021. DOI: 10.1016/j.iot.2021.100435.
  • K. Prathapchandran and T. Janani, “A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST,” Comput. Netw., vol. 198, pp. 108413, 2021. DOI: 10.1016/j.comnet.2021.108413.
  • J. Liu, D. Yang, M. Lian, and M. Li, “Research on intrusion detection based on particle swarm optimization in IoT,” IEEE Access., vol. 9, pp. 38254–38268, 2021. DOI: 10.1109/ACCESS.2021.3063671.
  • O. Alkadi, N. Moustafa, B. Turnbull, and K. K. R. Choo, “A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks,” IEEE Internet Things J, vol. 8, no. 12, pp. 9463–9472, 2021. DOI: 10.1109/JIOT.2020.2996590.
  • I. Ullah and Q. H. Mahmoud, “Design and development of a deep learning-based model for anomaly detection in IoT networks,” IEEE Access., vol. 9, pp. 103906–103926, 2021. DOI: 10.1109/ACCESS.2021.3094024.
  • Y. Zhang, P. Li, and X. Wang, “Intrusion detection for IoT based on improved genetic algorithm and deep belief network,” IEEE Access., vol. 7, pp. 31711–31722, 2019. DOI: 10.1109/ACCESS.2019.2903723.
  • M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Rafiq, and W. A. M. Abdullah, “Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT),” IEEE Access., vol. 10, pp. 22756–22768, 2022. DOI: 10.1109/ACCESS.2022.3153716.
  • A. Fatani, M. A. Elaziz, A. Dahou, M. A. A. Al-Qaness, and S. Lu, “IoT intrusion detection system using deep learning and enhanced transient search optimization,” IEEE Access., vol. 9, pp. 123448–123464, 2021. DOI: 10.1109/ACCESS.2021.3109081.
  • X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, and K. I. K. Wang, “Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system,” IEEE Internet Things J., vol. 9, no. 12, pp. 9310–9319, 2022. DOI: 10.1109/JIOT.2021.3130434.
  • M. Abdel-Basset, H. Hawash, R. K. Chakrabortty, and M. J. Ryan, “Semi-supervised spatiotemporal deep learning for intrusions detection in IoT networks,” IEEE Internet Things J., vol. 8, no. 15, pp. 12251–12265, 2021. DOI: 10.1109/JIOT.2021.3060878.
  • S. U. Jan, S. Ahmed, V. Shakhov, and I. Koo, “Toward a lightweight intrusion detection system for the internet of things,” IEEE Access., vol. 7, pp. 42450–42471, 2019. DOI: 10.1109/ACCESS.2019.2907965.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.